• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / A new trojan on Android steals your money through the official implementation of PayPal

A new trojan on Android steals your money through the official implementation of PayPal

12/12/2018 12:23 by Dimitris

Occasionally some trojans have been found on Android, but this is probably one of the worst. This new threat automates a $ 1000 PayPal transaction and sends it using the official PayPal application itself, even to two-point checking accounts (2FA).

trojan android - New trojan on Android steals your money through the official PayPal application

This is done using different, up to date methods and utilizing Android accessibility services. The trojan is currently disguising itself as an Android optimization tool called Android Optimization and has reached out to users' phones through third-party stores. Apart from the official Play store there are also third party stores so beginner advice: do not use third-party stores. Use only Play Store.

When you install the "Optimization Android" program, a service called "Enable statistics" is created. Of course this service requests access to monitor users' actions and retrieve the contents of windows.

trojan android 2 - New trojan on Android steals your money through the official PayPal application

But somewhere things get worse as the Trojan horse can imitate alerts. Creates a notice that looks like these PayPal that pushes the user to connect.

When you tap the notification, it opens the official PayPal application (if installed) and asks the user to log in. Since it is a legitimate attempt to link to the official Paypal application, 2FA does nothing to secure your account, in addition to sending you an extra code that you will normally log in when you place it.

Once logged in, the malicious application takes over the transfer of $ 1000 from your PayPal account to the attacker. This automated process occurs in less than five seconds. ESET made a video of the whole process and it is very crazy how fast the whole process is done:

Once you understand what is happening, it is too late to stop. The only thing that stops the process is that maybe your balance on PayPal is too low and you have not added other funding methods. So, Paypal simply cancels the transaction due to lack of money. Otherwise, you should find out within a week and make a "non-acceptance transaction" on Paypal, asking it to investigate and cancel the transaction, a process that takes at least 1 month.

But it does not end there. Not only does this trojan attack a user's PayPal account, but it also uses Android Screen Overlay to place illegal login screens on legitimate applications.

The trojan displays HTML overlays on Google Play, WhatsApp, Skype, and Viber, and then uses them to remove the credit card details. It can also create an overlay in Gmail by stealing user login credentials.

While the overlay attack is currently limited to the above-mentioned applications, the list could be updated at any time, which means that this type of attack can be expanded at any point to steal any type of information the attacker wants. ESET We Live Security emphasizes that the attacker could explore other options by using the overlay

A new trojan on Android steals your money through the official implementation of PayPal was last modified: 5 May, 2019, 9: 28 mm by Dimitris

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: android, https, I'm sure, youtube

You May Also Like

Adware: How can it steal your personal data?
YouTube prankster killed while recording video
Capture HTTPS / FTP packages with ARP Spoofing and MITM

About Us Dimitris

Dimitris hates on Mondays .....

Previous Post: « Windows 10 monitors Disabled Activity History
Next Post: WordPress What is the noopener tag? »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.